Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for carrying out a two-factor authentication

a two-factor authentication and authentication method technology, applied in the direction of user identity/authority verification, digital transmission, securing communication, etc., can solve the problems of currently enabled eid functionality and user execution time, and achieve the effect of minimizing the likelihood of unintentional interruption of authentications and token servers

Active Publication Date: 2022-02-22
GIESECKE & DEVRIENT MOBILE SECURITY GMBH
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

Enables two-factor authentication on various devices without additional hardware or issuer approval, reducing costs and user effort, while preventing replay attacks through server challenge verification and ensuring the data carrier's physical presence, thus enhancing security and usability.

Problems solved by technology

This generation of RSA keys would absorb too much computing time on the card, so that the execution time would be unacceptable to the user, and is not implemented on current credit cards.
However, the eID functionality is currently enabled only in 30-35% of the identity cards in the field.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out a two-factor authentication
  • Method for carrying out a two-factor authentication
  • Method for carrying out a two-factor authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040]Hereinafter, exemplary embodiments of the invention will be described in detail with reference to FIGS. 1-3. Changes with reference to the method described are possible within the scope of protection defined by the claims.

[0041]FIG. 1 schematically shows the sequence of a two-factor authentication according to the invention between a client and a relying party. A client is, for example, a mobile telephone, a tablet PC, a computer (PC) or the like. By way of example, a relying party can be a facility such as a host, a server, or the like that makes possible access to a service, particularly a secure software application.

[0042]For the two-factor authentication, the industry standard U2F (Universal Second Factor) is preferably used. The U2F specification is managed by the FIDO Alliance.

[0043]In the two-factor authentication according to the invention, first (step 1) an authentication is carried out between the client and the relying party. This can be carried out, for example, by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for carrying out a two-factor authentication between a client and a relying party, wherein, as the second factor, a data carrier is employed which carries out a communication with a token server.

Description

TECHNICAL FIELD[0001]The present invention relates to a method for carrying out a two-factor authentication between a client and a relying party.[0002]A client is, for example, a mobile telephone, a tablet PC, a computer (PC) or the like. By way of example, a relying party can be a facility such as a host, a server, or the like that makes possible access to a service, in particular a secure software application.[0003]For the two-factor authentication, the industry standard U2F (Universal Second Factor) is preferably used. The U2F specification is managed by the FIDO Alliance (Fast IDentity Online).STATE OF THE ART[0004]The two-factor authentication is usually initiated by a service provider (relying party) asking, as the first factor, for the user name and possibly for the associated password for authentication, wherein the user name identifies the user and the password authenticates the user. The service provider checks these data and, if the data are in order, commences the verifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0807H04L9/3213H04L9/3226H04L9/3234H04L9/3271H04L63/0428H04L63/0853H04L63/123H04L2463/082
Inventor STÖHR, VOLKERKAMM, FRANK-MICHAELGERHARDT, NILS
Owner GIESECKE & DEVRIENT MOBILE SECURITY GMBH